GTX 1050 sistemde mavi ekran hatası

İşletim sistemi
Windows 10

Cumali0110

Decapat
Katılım
20 Temmuz 2022
Mesajlar
12
Daha fazla  
Cinsiyet
Erkek
RAM
Kingston 8GB DDR3 1600MHz -KVR16N11/8 18712
SSD veya HDD modeli
WDC WD10EZRX-00L4HB0 ATA Device
Ekran kartı
GTX 1050
Anakart
GA-780T-D3L
İşlemci
AMD-fx8350
minidump dosyaları burada yardımcı olursanız sevinirim.
 
Son düzenleyen: Moderatör:
HD Tune 5.75 indirip HDD'nizin Health sekmesinden ekran alıntısı paylaşırsanız sevinirim. Sorun diskte gibi.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the BugCheck.
Arg2: ffffc185e1550a20
Arg3: ffffe7809b3b4000
Arg4: ffffd707c8229ae4

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1796

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4708

    Key  : Analysis.Init.CPU.mSec
    Value: 312

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6755

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Memory.System.Errors.BadPageCount
    Value: 23

    Key  : Memory.System.Errors.ScrubErrors
    Value: 23


FILE_IN_CAB:  071922-32890-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 31

BUGCHECK_P2: ffffc185e1550a20

BUGCHECK_P3: ffffe7809b3b4000

BUGCHECK_P4: ffffd707c8229ae4

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

BAD_PAGES_DETECTED: 17

STACK_TEXT: 
ffffa00b`65a6d998 fffff807`5d9feaa3     : 00000000`0000001a 00000000`00000031 ffffc185`e1550a20 ffffe780`9b3b4000 : nt!KeBugCheckEx
ffffa00b`65a6d9a0 fffff807`5d81c26c     : ffffe780`9b3b4000 ffffd707`c8229aa2 00000000`00000051 00000000`00000000 : nt!MiApplyCompressedFixups+0x1e29f3
ffffa00b`65a6da00 fffff807`5d81c88d     : 00000000`00000000 ffffc185`e1550a20 ffffffff`e1250000 00000000`00000051 : nt!MiPerformFixups+0x88
ffffa00b`65a6daa0 fffff807`5d476dc1     : ffffd2f3`c04d62b0 ffffc185`e1550a20 00000000`00000008 ffffa00b`65a6dc10 : nt!MiRelocateImagePfn+0x18d
ffffa00b`65a6db10 fffff807`5d7db2ed     : 00000000`75130000 00000000`00000000 00000000`15130000 ffffd707`c9c12200 : nt!MiWalkEntireImage+0x521
ffffa00b`65a6dd40 fffff807`5d7dbdfc     : ffffc185`e1550a20 00000000`56380000 00000000`00000000 ffffd707`c8228000 : nt!MiSwitchBaseAddress+0x5d
ffffa00b`65a6dd70 fffff807`5d7db895     : 00000000`56380000 ffffa00b`65a6e040 ffffc185`e3af5080 00000000`00000000 : nt!MiRelocateImageAgain+0x188
ffffa00b`65a6de00 fffff807`5d82219b     : 00000000`00000002 ffffa00b`00000000 ffffc185`e3eb9840 ffffa00b`65a6e040 : nt!MiValidateExistingImage+0x81
ffffa00b`65a6dea0 fffff807`5d8234cd     : 00000000`00000000 ffffa00b`65a6e040 ffffc185`e3af5080 ffffc185`e3eb9840 : nt!MiShareExistingControlArea+0xc7
ffffa00b`65a6ded0 fffff807`5d822c44     : ffffc185`e1550a20 00000000`00000000 ffffc185`e3eb9840 00000000`00000000 : nt!MiCreateImageOrDataSection+0x1ad
ffffa00b`65a6dfc0 fffff807`5d822987     : 00000000`11000000 ffffa00b`65a6e331 00000000`00000000 00000000`00000002 : nt!MiCreateSection+0xf4
ffffa00b`65a6e140 fffff807`5d82270c     : ffffa00b`65a6e398 ffffa00b`00000005 ffffa00b`65a6e308 fffff807`5d43cc14 : nt!MiCreateSectionCommon+0x207
ffffa00b`65a6e220 fffff807`5d7f8c4c     : 00000000`000008a0 ffffffff`ffe91ca0 00000000`00000020 ffffffff`80002438 : nt!NtCreateSection+0x5c
ffffa00b`65a6e290 fffff807`5d839d62     : 00000000`11000000 00000000`00000000 00000000`00000000 ffffc185`00000060 : nt!PfpFileBuildReadSupport+0x1c8
ffffa00b`65a6e390 fffff807`5d83f3a9     : 00000000`00000000 ffffa00b`00000017 ffffd707`00000000 00000000`00000006 : nt!PfpPrefetchFilesTrickle+0x1c6
ffffa00b`65a6e480 fffff807`5d83fbce     : ffffd707`db9e5000 ffffd707`db9e5000 ffffa00b`65a6e6a0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x299
ffffa00b`65a6e5f0 fffff807`5d8456d9     : 00000000`00000001 fffff807`5d4b4a01 ffffc185`e6a85be0 ffffd707`db9e5000 : nt!PfpPrefetchRequest+0x132
ffffa00b`65a6e670 fffff807`5d84456d     : ffffc185`00000000 00000000`00000000 00000000`2aac9eb5 00000000`2aac9e01 : nt!PfSetSuperfetchInformation+0x155
ffffa00b`65a6e770 fffff807`5d6096b8     : 00000000`00000001 00000000`00000000 ffffa00b`65a6eb80 00000000`00000000 : nt!NtSetSystemInformation+0x9bd
ffffa00b`65a6eb00 00007ffe`8acf0274     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c8`6c37f608 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8acf0274


SYMBOL_NAME:  PAGE_NOT_ZERO

MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  PAGE_NOT_ZERO_0x1a_31

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7bffb5e0-eeb7-e109-1d31-4c57d47f6a6c}

Followup:     MachineOwner
---------

 *** Memory manager detected 23 instance(s) of page corruption, target is likely to have memory corruption.

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8077f2c83de, Address of the instruction which caused the BugCheck
Arg3: ffffc900822b5920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1859

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8231

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 15751

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  072022-30484-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8077f2c83de

BUGCHECK_P3: ffffc900822b5920

BUGCHECK_P4: 0

CONTEXT:  ffffc900822b5920 -- (.cxr 0xffffc900822b5920)
rax=0000000000000000 rbx=fffff684b9676390 rcx=fffff684b9676390
rdx=0010000000000000 rsi=0000000000000700 rdi=ffff800dfc571b80
rip=fffff8077f2c83de rsp=fffff684b9676300 rbp=ffff800dfb3b4080
 r8=0000000000000000  r9=0000000000000004 r10=0000000000000000
r11=fffff684b96763f0 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff807`7f2c83de 48890a          mov     qword ptr [rdx],rcx ds:002b:00100000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT: 
fffff684`b9676300 fffff807`7f2c83bf     : 00000000`00000000 fffff807`7fcdb500 fffff684`00000000 fffff684`b9676350 : nt!KxWaitForLockOwnerShip+0xe
fffff684`b9676330 fffff807`7f251690     : ffff800d`fc571b20 00000000`00000000 00000000`00000000 fffff684`b9676700 : nt!KeAcquireInStackQueuedSpinLock+0x7f
fffff684`b9676360 fffff807`840d3d00     : fffff684`b9676700 00000000`00000702 00000000`00000004 ffffdf85`dc54a5a0 : nt!ExAcquireResourceExclusiveLite+0xb0
fffff684`b96763f0 fffff807`840e57ae     : ffff800d`fa41aa28 ffffdf85`dc54a5a0 ffffdf85`dc54a700 ffff800d`00000001 : Ntfs!NtfsAcquireExclusiveFcb+0x90
fffff684`b9676470 fffff807`840eaf51     : 00000000`00000000 ffffdf85`dc54a5a0 ffff800d`00000000 00000000`00000000 : Ntfs!NtfsAcquireExclusiveScbEx+0x22
fffff684`b96764a0 fffff807`840e78e3     : ffff800d`fa41aa28 ffff800d`fddb7ae0 fffff684`b9676740 00000000`00000000 : Ntfs!NtfsCommonWrite+0x3201
fffff684`b96766d0 fffff807`7f24e565     : ffff800d`fd4f4300 ffff800d`fddb7ae0 ffff800d`fddb7ae0 ffff800d`f1a88c00 : Ntfs!NtfsFsdWrite+0x1d3
fffff684`b96767a0 fffff807`7e1272af     : ffff800d`f1990007 00000000`00000000 ffff800d`f1a908a0 ffff800d`fc705570 : nt!IofCallDriver+0x55
fffff684`b96767e0 fffff807`7e124b33     : fffff684`b9676870 00000000`00000000 00000000`00000001 00000000`20707249 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff684`b9676850 fffff807`7f24e565     : ffff800d`fddb7ae0 fffff684`b9676a20 fffff684`00000000 ffff800d`fc705570 : FLTMGR!FltpDispatch+0xa3
fffff684`b96768b0 fffff807`7f60da18     : 00000000`00000001 ffff800d`fc705570 00000000`00000001 ffff800d`fddb7f58 : nt!IofCallDriver+0x55
fffff684`b96768f0 fffff807`7f5fc89f     : ffff800d`00000000 fffff684`b9676b80 00000000`00000000 fffff684`b9676b80 : nt!IopSynchronousServiceTail+0x1a8
fffff684`b9676990 fffff807`7f4096b8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000069`203fe980 : nt!NtWriteFile+0x66f
fffff684`b9676a90 00007ff9`03c0ce44     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000069`203fe8d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`03c0ce44


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1706

STACK_COMMAND:  .cxr 0xffffc900822b5920 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93}

Followup:     MachineOwner
---------
 
Sağlık bölümünde böyle bir şey çıkıyor, bu bir sorun mu?

 
Son düzenleyen: Moderatör:
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…